Finalising Flashcards

(50 cards)

1
Q

Insertion anomaly

A

The inability to add data to the database due to the absence of other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Deletion anomaly

A

Occurs when you delete a record that may contain attributes that shouldn’t be deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Modification/Update anomaly

A

Caused by the addition of, change to, or deletion of data from a database table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Factors that impact the performance of a database

A
  • workload
  • throughput
  • resources
  • optimisation
  • contention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Importance of adding comments to code

A

Not always easy to remember program code written some time ago. Comments let the reader know what the source is meant to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Declare a list of strings items

A

Dim lstProgLanguages As New List (Of String)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Add items to list

A

lstProgLanguages.Add

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remove items to list

A

lstProgLanguages.Remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

Protocol allowing unencrypted info to flow from server to client’s browser allowing sensitive info to be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTPS

A

Protocol creating secure encrypted connection between server and client’s browser, thereby protecting sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tags used to create a drop down list

A

<selection>
<option>
</option></selection>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

<optgroup>
</optgroup>

A

Used to group together related items within a selected list. Makes it easier for users to make choices when looking at large lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internal CSS

A

Requires that CSS rules be placed inside the <style> and </style> tags within the <head> section of the page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

External CSS

A

CSS rules are placed in a text file with file extension .css and the <link></link> tag is used to link test file to the HTML code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inline CSS

A

CSS rules are placed inside the style attribute of each html tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Performance testing

A

Tests how an application would work when used by the expected number of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stress testing

A

Tests how the application would work when used by more than the expected number of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Portability testing

A

Tests the application to see how it works when moved to another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Objectives a database driven software app must satisfy

A

Supporting concurrency:
The app should allow multiple users access but be able to handle concurrent updating of same data

Data integrity:
The app should allow valid and well formatted data

Security/Authentication:
the app should allow authorised users only

Fault tolerance:
The app should be able to handle potential problems gracefully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2D array

A

Dim int ICASS_MArks(,) As Integer
{
{68,56,76,45,79}
{34,50,57,70,60}
}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

<textarea>
</textarea>

A

allows the user to enter multiple lines of text

22
Q

<input></input>

A

allows only one line of text to be entered

23
Q

Process that occurs when an internet user enters a URL with a domain name in a web browser

A
  • DNS looks up the IP address of the domain name
  • Web browser uses HTTP/HTTPS to send the request to the web server
  • Web server responds with necessary HTML document
    -Web browser then translates the HTML document into a webpage
24
Q

Methods to manage security issues

A
  • Make sure that antivirus software is installed and regularly updated
  • Ensure that computers and servers are password protected
  • Restricted entrance to key computer resources with unauthorised access
25
WYSIGWYG editor
- Allows a developer to see what the webpage looks as the coding progresses - Similiar to VB.NET software where developers drag and drop - Generates source code for the developer and beginners lose the opportunity to learn
26
Advanced HTML editor
- Coding stops for developer to view what the webpage looks like - No drag and drop facilities, developers type the source code from scratch - Takes longer to complete tying the source code
27
Hypertext
text that can be clicked on to move on to another webpage
28
Hyperlink
Path to a specific webpage
29
Constructor
Special method used to initialise the data members to default values whenever an object is instantiated
30
Class
Blueprint of the method and variable in a particular kind of object
31
Superclass
Class where other classes inherit data members and methods
32
Encapsulation
Hiding the code and data in a single unit such as a class
33
Inheritance
OOP mechanism that enables a class or object to inherit attributes and methods from class
34
Constructors
special sub class that is automatically called when an object of a specified class is created
35
Polymorphism
OOP concept that allows methods with the same name to behave in different ways depending on the requirements
36
Overloading
refers to creating many methods with the same name but with different parameter lists
37
Overriding
refers to the use of two methods wit the same name and parameter list but each method must perform different sets of tasks
38
Inbuilt methods of the List, ArrayList and Array classes.
Add: adds items in an array list Insert: inserts items into a specified position Remove: remove an item from an array list RemoveAt: remove an item from a specified position Sort: sort items in an array list
39
WWW
World Wide Web
40
DNS
Domain Name System
41
HTTP
hyper text transfer protocol
42
HTTPS
hyper text transfer protocol secure
43
FTP
File transfer protocol
44
TCP
transmission control protocol
45
IP
internet protocol
46
Internet Message Access Protocol
allows you to access your emails from wherever you are
47
POP
procedural oriented programming focuses on processes that we apply to the data to produce the required outcomes from the given inputs
48
SMTP
Simple Mail Transfer Protocol TCP/IP protocol used in sending and receiving email.
49
Royalties
payment made to the owner of the content in return for being able to use that content
50
copyright
the legal right to ownership of content